#FactCheck- Delhi Metro Rail Corporation Price Hike
Executive Summary:
Recently, a viral social media post alleged that the Delhi Metro Rail Corporation Ltd. (DMRC) had increased ticket prices following the BJP’s victory in the Delhi Legislative Assembly elections. After thorough research and verification, we have found this claim to be misleading and entirely baseless. Authorities have asserted that no fare hike has been declared.
Claim:
Viral social media posts have claimed that the Delhi Metro Rail Corporation Ltd. (DMRC) increased metro fares following the BJP's victory in the Delhi Legislative Assembly elections.


Fact Check:
After thorough research, we conclude that the claims regarding a fare hike by the Delhi Metro Rail Corporation Ltd. (DMRC) following the BJP’s victory in the Delhi Legislative Assembly elections are misleading. Our review of DMRC’s official website and social media handles found no mention of any fare increase.Furthermore, the official X (formerly Twitter) handle of DMRC has also clarified that no such price hike has been announced. We urge the public to rely on verified sources for accurate information and refrain from spreading misinformation.

Conclusion:
Upon examining the alleged fare hike, it is evident that the increase pertains to Bengaluru, not Delhi. To verify this, we reviewed the official website of Bangalore Metro Rail Corporation Limited (BMRCL) and cross-checked the information with appropriate evidence, including relevant images. Our findings confirm that no fare hike has been announced by the Delhi Metro Rail Corporation Ltd. (DMRC).

- Claim: Delhi Metro price Hike after BJP’s victory in election
- Claimed On: X (Formerly Known As Twitter)
- Fact Check: False and Misleading
Related Blogs

Introduction
After the tragic bomb blast at RedFort on November 10, 2025, there is a trail of misinformation and false narratives spread rapidly across social media platforms, messaging and news channels. It can not only unfold into a public misunderstanding but can also incite panic, communal tensions and endanger lives. To prevent all of these from happening, we, as responsible citizens, can play a critical role by verifying information before sharing it with friends, family, or colleagues. This article provides guidance on practical, evidence-based strategies to navigate the information landscape and protect yourself and your community from the harm caused by misinformation and disinformation.
Digital Scams in the Aftermath of the Blast
Cybercriminals increased their activity in the hours after the Red Fort explosion, using the country’s sorrow as a chance to take advantage of fear.
Numerous allegations surfaced of residents receiving threatening calls that falsely claimed they were “digitally arrested” or that their phones, bank accounts, or Aadhaar were being “seized for investigation”, accusing them of being involved in the explosion. These fictitious intimidation calls sent innocent people into worry, anxiety, and doubt spirals.
The pattern is common after major national crises:
- Fear rises.
- People seek urgent answers.
- Cybercriminals exploit the confusion.
Knowing this makes it easier for us to remain watchful. No law enforcement organisation uses phone conversations, WhatsApp communications, or threats of “digital detention” to make arrests or conduct investigations.
Verify breaking news from trusted official channels
Whenever a crisis like bomb blasts occurs, people look for information on social media, news channels, and YouTube channels to stay fully informed about the situation. This is a very chaotic moment, and due to the lack of government verification of the initial information, false news spread rapidly.
Where to seek verified information:
a. Press Information Bureau (PIB): The official government news agency that, from time to time, clarifies viral news.
b. Delhi Police Official Channels: Check social media handles of Delhi Police.
c. Ministry of Home Affairs (MHA): MHA is responsible for internal security, and gives information about this information through official press releases and notifications.
d. Major Credible news outlets: Some news channels can be trusted with news, as they typically verify information before publishing, like The Hindu, Indian Express.
What to do:
Cross-check every unverified social media post and news that you come across from credible news channels and official government press releases.
Verify Images and videos using reverse search tools
Recently, many social media handles have been sharing old photos of different bomb blasts from Ukraine, Israel, and Palestine in the name of the Red Fort blasts. While it can create a false narrative, the same should be verified before sharing.
Reliable fact-checking resources and how to use them.
Every country has dedicated fact-checking organisations that systematically verify viral claims.
Fact-checking organisations based in India:
a. PIB Fact Check (https://factcheck.pib.gov.in/ )
· It is the official fact-checking unit of the PIB, which focuses on demystifying government-related misinformation.
· email: socialmedia@pib.gov.in
· Telegram: http://t.me/PIB_FactCheck
· Follow it on: Twitter (@PIBFactCheck), Facebook, Instagram, Telegram and WhatsApp.
How to use these resources:
· Whenever you come across any viral post, use exact keywords or quotes to find those on these resources.
· Look for the verdict (true, false, misleading), then share the verified fact-checks with your network to debunk false narratives.
Practice Digital Hygiene and Be Cautious When Sharing
Digital hygiene refers to the practices and habits individuals adopt to maintain a healthy and secure digital lifestyle. Simple digital practices can restrict the spread of misinformation. A vigilant individual can reduce the spread of misinformation. It can be done by below steps
i. Check URLs and Links: We can verify the URLs and links of any news and websites using different tools to check the credibility of any news
ii. How to Evaluate the Trustworthiness of Sources:
· Verify if the account sharing the information has a blue checkmark on most platforms.
· Examine the account's background, whether it is a recognised media source, an official government profile, or a newly created anonymous account?
· Approach posts featuring intense emotional language ("URGENT!", "SHOCKING!", "MUST SHARE!") with scepticism.
· Refrain from posting screenshots of tweets or posts while providing a link to the source, allowing others to confirm its validity.
iii. Before You Distribute:
· Question yourself: "Am I certain this is accurate based on a reliable source?"
· Avoid the temptation to share breaking news immediately; hold off until it has been confirmed by government sources.
· If you're uncertain, include a comment such as "I haven't confirmed this yet; please consult reliable sources" instead of sharing unverified information.
· Reflect on the consequences, as it might lead to panic, provoke communal violence, or damage an individual's reputation
6. How to report misinformation to platforms and authorities?
While it is important to verify news before sharing it to prevent fake news, it is also important to report it to reduce misinformation and the violence caused due to it. On social media like Facebook, Instagram, Twitter/X, WhatsApp, and Telegram, anyone can report the same on the platform.
Reporting to the Government Authorities:
a. PIB Fact Check WhatsApp (+91 8799711259):
Send Screenshots or texts of suspected government-related misinformation for verification, and then an automated acknowledgement is generated.
b. Delhi Police Cyber Crime Unit
Cyber Crimes such as Email Frauds, Social Media Crimes, Mobile App-related crimes, Business Email Compromise, Data Theft, Ransomware, Net Banking/ ATM Frauds and fake calls frauds, insurance frauds, lottery scam, bitcoin, cheating scams, online transactions frauds can be reported to the Delhi Police Cyber Crime Unit.
7. Quick checklist: What to do When You See Breaking News
· Wait before sharing any breaking news.
· Go through official channels like PIB and other official channels like MHA.
· If not available there, then cross-reference it from 2-3 credible news sources for the same information.
· Check timestamps and metadata, and compare metadata dates with claims about when events occurred.
· In case you find any information, news or any social media posts as misleading, then report the same.
CyberPeace Resolves: Pause. Reflect. Then Respond
Misinformation becomes the infection that spreads the fastest when people are confused and afraid. Every citizen is urged by CyberPeace to remain composed, stand tall, and not panic, particularly in times of national emergency.
Prior to experiencing an emotional response to any concerning call, message, or widely shared news:
Pause. Reflect. Acknowledge.
- Pause before sharing or responding.
- Reflect on whether the information is from a credible source.
- Acknowledge what you know—and what is just rumour.
CyberPeace is still dedicated to helping people and communities deal with online dangers, safeguard mental health, and dispel false information with clarity and truth.

Executive Summary:
A viral social media video falsely claims that Meta AI reads all WhatsApp group and individual chats by default, and that enabling “Advanced Chat Privacy” can stop this. On performing reverse image search we found a blog post of WhatsApp which was posted in the month of April 2025 which claims that all personal and group chats remain protected with end to end (E2E) encryption, accessible only to the sender and recipient. Meta AI can interact only with messages explicitly sent to it or tagged with @MetaAI. The “Advanced Chat Privacy” feature is designed to prevent external sharing of chats, not to restrict Meta AI access. Therefore, the viral claim is misleading and factually incorrect, aimed at creating unnecessary fear among users.
Claim:
A viral social media video [archived link] alleges that Meta AI is actively accessing private conversations on WhatsApp, including both group and individual chats, due to the current default settings. The video further claims that users can safeguard their privacy by enabling the “Advanced Chat Privacy” feature, which purportedly prevents such access.

Fact Check:
Upon doing reverse image search from the keyframe of the viral video, we found a WhatsApp blog post from April 2025 that explains new privacy features to help users control their chats and data. It states that Meta AI can only see messages directly sent to it or tagged with @Meta AI. All personal and group chats are secured with end-to-end encryption, so only the sender and receiver can read them. The "Advanced Chat Privacy" setting helps stop chats from being shared outside WhatsApp, like blocking exports or auto-downloads, but it doesn’t affect Meta AI since it’s already blocked from reading chats. This shows the viral claim is false and meant to confuse people.


Conclusion:
The claim that Meta AI is reading WhatsApp Group Chats and that enabling the "Advance Chat Privacy" setting can prevent this is false and misleading. WhatsApp has officially confirmed that Meta AI only accesses messages explicitly shared with it, and all chats remain protected by end-to-end encryption, ensuring privacy. The "Advanced Chat Privacy" setting does not relate to Meta AI access, as it is already restricted by default.
- Claim: Viral social media video claims that WhatsApp Group Chats are being read by Meta AI due to current settings, and enabling the "Advance Chat Privacy" setting can prevent this.
- Claimed On: Social Media
- Fact Check: False and Misleading

Introduction
Cyber-attacks are another threat in this digital world, not exclusive to a single country, that could significantly disrupt global movements, commerce, and international relations all of which experienced first-hand when a cyber-attack occurred at Heathrow, the busiest airport in Europe, which threw their electronic check-in and baggage systems into a state of chaos. Not only were there chaos and delays at Heathrow, airports across Europe including Brussels, Berlin, and Dublin experienced delay and had to conduct manual check-ins for some flights further indicating just how interconnected the world of aviation is in today's world. Though Heathrow assured passengers that the "vast majority of flights" would operate, hundreds were delayed or postponed for hours as those passengers stood in a queue while nearly every European airport's flying schedule was also negatively impacted.
The Anatomy of the Attack
The attack specifically targeted Muse software by Collins Aerospace, a software built to allow various airlines to share check-in desks and boarding gates. The disruption initially perceived to be technical issues soon turned into a logistical nightmare, with airlines relying on Muse having to engage in horror-movie-worthy manual steps hand-tagging luggage, verifying boarding passes over the phone, and manually boarding passengers. While British Airways managed to revert to a backup system, most other carriers across Heathrow and partner airports elsewhere in Europe had to resort to improvised manual solutions.
The trauma was largely borne by the passengers. Stories emerged about travelers stranded on the tarmac, old folks left barely able to walk without assistance, and even families missing important connections. It served to remind everyone that the aviation world, with its schedules interlocked tightly across borders, can see even a localized system failure snowball into a continental-level crisis.
Cybersecurity Meets Aviation Infrastructure
In the last two decades, aviation has become one of the more digitally dependent industries in the world. From booking systems and baggage handling issues to navigation and air traffic control, digital systems are the invisible scaffold on which flight operations are supported. Though this digitalization has increased the scale of operations and enhanced efficiency, it must have also created many avenues for cyber threats. Cyber attackers increasingly realize that to target aviation is not just about money but about leverage. Just interfering with the check-in system of a major hub like Heathrow is more than just financial disruption; it causes panic and hits the headlines, making it much more attractive for criminal gangs and state-sponsored threat actors.
The Heathrow incident is like the worldwide IT crash in July 2024-thwarting activities of flights caused by a botched Crowdstrike update. Both prove the brittleness of digital dependencies in aviation, where one failure point triggering uncontrollable ripple effects spanning multiple countries. Unlike conventional cyber incidents contained within corporate networks, cyber-attacks in aviation spill on to the public sphere in real time, disturbing millions of lives.
Response and Coordination
Heathrow Airport first added extra employees to assist with manual check-in and told passengers to check flight statuses before traveling. The UK's National Cyber Security Centre (NCSC) collaborated with Collins Aerospace, the Department for Transport, and law enforcement agencies to investigate the extent and source of the breach. Meanwhile, the European Commission published a statement that they are "closely following the development" of the cyber incident while assuring passengers that no evidence of a "widespread or serious" breach has been observed.
According to passengers, the reality was quite different. Massive passenger queues, bewildering announcements, and departure time confirmations cultivated an atmosphere of chaos. The wrenching dissonance between the reassurances from official channel and Kirby needs to be resolved about what really happens in passenger experiences. During such incidents, technical restoration and communication flow are strategies for retaining public trust in incidents.
Attribution and the Shadow of Ransomware
As with many cyber-attacks, questions on its attribution arose quite promptly. Rumours of hackers allegedly working for the Kremlin escaped into the air quite possibly inside seconds of the realization, Cybersecurity experts justifiably advise against making conclusions hastily. Extortion ransomware gangs stand the last chance to hold the culprits, whereas state actors cannot be ruled out, especially considering Russian military activity under European airspace. Meanwhile, Collins Aerospace has refused to comment on the attack, its precise nature, or where it originated, emphasizing an inherent difficulty in cyberattribution.
What is clear is the way these attacks bestow criminal leverage and dollars. In previous ransomware attacks against critical infrastructure, cybercriminal gangs have extorted millions of dollars from their victims. In aviation terms, the stakes grow exponentially, not only in terms of money but national security and diplomatic relations as well as human safety.
Broader Implications for Aviation Cybersecurity
This incident brings to consideration several core resilience issues within aviation systems. Traditionally, the airports and airlines had placed premium on physical security, but today, the equally important concept of digital resilience has come into being. Systems such as Muse, which bind multiple airlines into shared infrastructure, offer efficiency but, at the same time, also concentrate that risk. A cyber disruption in one place will cascade across dozens of carriers and multiple airports, thereby amplifying the scale of that disruption.
The case also brings forth redundancy and contingency planning as an urgent concern. While BA systems were able to stand on backups, most other airlines could not claim that advantage. It is about time that digital redundancies, be it in the form of parallel systems or isolated backups or even AI-driven incident response frameworks, are built into aviation as standard practice and soon.
On the policy plane, this incident draws attention to the necessity for international collaboration. Aviation is therefore transnational, and cyber incidents standing on this domain cannot possibly be handled by national agencies only. Eurocontrol, the European Commission, and cross-border cybersecurity task forces must spearhead this initiative to ensure aviation-wide resilience.
Human Stories Amid a Digital Crisis
Beyond technical jargon and policy response, the human stories had perhaps the greatest impact coming from Heathrow. Passengers spoke of hours spent queuing, heading to funerals, and being hungry and exhausted as they waited for their flights. For many, the cyber-attack was no mere headline; instead, it was ¬ a living reality of disruption.
These stories reflect the fact that cybersecurity is no hunger strike; it touches people's lives. In critical sectors such as aviation, one hour of disruption means missed connections for passengers, lost revenue for airlines, and inculcates immense emotional stress. Crisis management must therefore entail technical recovery and passenger care, communication, and support on the ground.
Conclusion
The cybersecurity crisis of Heathrow and other European airports emphasizes the threat of cyber disruption on the modern legitimacy of aviation. The use of increased connectivity for airport processes means that any cyber disruption present, no matter how small, can affect scheduling issues regionally or on other continents, even threatening lives. The occurrences confirm a few things: a resilient solution should provide redundancy not efficiency; international networking and collaboration is paramount; and communicating with the traveling public is just as important (if not more) as the technical recovery process.
As governments, airlines, and technology providers analyse the disruption, the question is longer if aviation can withstand cyber threats, but to what extent it will be prepared to defend itself against those attacks. The Heathrow crisis is a reminder that the stake of cybersecurity is not just about a data breach or outright stealing of money but also about stealing the very systems that keep global mobility in motion. Now, the aviation industry is tested to make this disruption an opportunity to fortify the digital defences and start preparing for the next inevitable production.
References
- https://www.bbc.com/news/articles/c3drpgv33pxo
- https://www.theguardian.com/business/2025/sep/21/delays-continue-at-heathrow-brussels-and-berlin-airports-after-alleged-cyber-attack
- https://www.reuters.com/business/aerospace-defense/eu-agency-says-third-party-ransomware-behind-airport-disruptions-2025-09-22/